Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-38168

Publication date:
03/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> perf: arm-ni: Unregister PMUs on probe failure<br /> <br /> When a resource allocation fails in one clock domain of an NI device,<br /> we need to properly roll back all previously registered perf PMUs in<br /> other clock domains of the same device.<br /> <br /> Otherwise, it can lead to kernel panics.<br /> <br /> Calling arm_ni_init+0x0/0xff8 [arm_ni] @ 2374<br /> arm-ni ARMHCB70:00: Failed to request PMU region 0x1f3c13000<br /> arm-ni ARMHCB70:00: probe with driver arm-ni failed with error -16<br /> list_add corruption: next-&gt;prev should be prev (fffffd01e9698a18),<br /> but was 0000000000000000. (next=ffff10001a0decc8).<br /> pstate: 6340009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)<br /> pc : list_add_valid_or_report+0x7c/0xb8<br /> lr : list_add_valid_or_report+0x7c/0xb8<br /> Call trace:<br /> __list_add_valid_or_report+0x7c/0xb8<br /> perf_pmu_register+0x22c/0x3a0<br /> arm_ni_probe+0x554/0x70c [arm_ni]<br /> platform_probe+0x70/0xe8<br /> really_probe+0xc6/0x4d8<br /> driver_probe_device+0x48/0x170<br /> __driver_attach+0x8e/0x1c0<br /> bus_for_each_dev+0x64/0xf0<br /> driver_add+0x138/0x260<br /> bus_add_driver+0x68/0x138<br /> __platform_driver_register+0x2c/0x40<br /> arm_ni_init+0x14/0x2a [arm_ni]<br /> do_init_module+0x36/0x298<br /> ---[ end trace 0000000000000000 ]---<br /> Kernel panic - not syncing: Oops - BUG: Fatal exception<br /> SMP: stopping secondary CPUs
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2025

CVE-2025-38166

Publication date:
03/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: fix ktls panic with sockmap<br /> <br /> [ 2172.936997] ------------[ cut here ]------------<br /> [ 2172.936999] kernel BUG at lib/iov_iter.c:629!<br /> ......<br /> [ 2172.944996] PKRU: 55555554<br /> [ 2172.945155] Call Trace:<br /> [ 2172.945299] <br /> [ 2172.945428] ? die+0x36/0x90<br /> [ 2172.945601] ? do_trap+0xdd/0x100<br /> [ 2172.945795] ? iov_iter_revert+0x178/0x180<br /> [ 2172.946031] ? iov_iter_revert+0x178/0x180<br /> [ 2172.946267] ? do_error_trap+0x7d/0x110<br /> [ 2172.946499] ? iov_iter_revert+0x178/0x180<br /> [ 2172.946736] ? exc_invalid_op+0x50/0x70<br /> [ 2172.946961] ? iov_iter_revert+0x178/0x180<br /> [ 2172.947197] ? asm_exc_invalid_op+0x1a/0x20<br /> [ 2172.947446] ? iov_iter_revert+0x178/0x180<br /> [ 2172.947683] ? iov_iter_revert+0x5c/0x180<br /> [ 2172.947913] tls_sw_sendmsg_locked.isra.0+0x794/0x840<br /> [ 2172.948206] tls_sw_sendmsg+0x52/0x80<br /> [ 2172.948420] ? inet_sendmsg+0x1f/0x70<br /> [ 2172.948634] __sys_sendto+0x1cd/0x200<br /> [ 2172.948848] ? find_held_lock+0x2b/0x80<br /> [ 2172.949072] ? syscall_trace_enter+0x140/0x270<br /> [ 2172.949330] ? __lock_release.isra.0+0x5e/0x170<br /> [ 2172.949595] ? find_held_lock+0x2b/0x80<br /> [ 2172.949817] ? syscall_trace_enter+0x140/0x270<br /> [ 2172.950211] ? lockdep_hardirqs_on_prepare+0xda/0x190<br /> [ 2172.950632] ? ktime_get_coarse_real_ts64+0xc2/0xd0<br /> [ 2172.951036] __x64_sys_sendto+0x24/0x30<br /> [ 2172.951382] do_syscall_64+0x90/0x170<br /> ......<br /> <br /> After calling bpf_exec_tx_verdict(), the size of msg_pl-&gt;sg may increase,<br /> e.g., when the BPF program executes bpf_msg_push_data().<br /> <br /> If the BPF program sets cork_bytes and sg.size is smaller than cork_bytes,<br /> it will return -ENOSPC and attempt to roll back to the non-zero copy<br /> logic. However, during rollback, msg-&gt;msg_iter is reset, but since<br /> msg_pl-&gt;sg.size has been increased, subsequent executions will exceed the<br /> actual size of msg_iter.<br /> &amp;#39;&amp;#39;&amp;#39;<br /> iov_iter_revert(&amp;msg-&gt;msg_iter, msg_pl-&gt;sg.size - orig_size);<br /> &amp;#39;&amp;#39;&amp;#39;<br /> <br /> The changes in this commit are based on the following considerations:<br /> <br /> 1. When cork_bytes is set, rolling back to non-zero copy logic is<br /> pointless and can directly go to zero-copy logic.<br /> <br /> 2. We can not calculate the correct number of bytes to revert msg_iter.<br /> <br /> Assume the original data is "abcdefgh" (8 bytes), and after 3 pushes<br /> by the BPF program, it becomes 11-byte data: "abc?de?fgh?".<br /> Then, we set cork_bytes to 6, which means the first 6 bytes have been<br /> processed, and the remaining 5 bytes "?fgh?" will be cached until the<br /> length meets the cork_bytes requirement.<br /> <br /> However, some data in "?fgh?" is not within &amp;#39;sg-&gt;msg_iter&amp;#39;<br /> (but in msg_pl instead), especially the data "?" we pushed.<br /> <br /> So it doesn&amp;#39;t seem as simple as just reverting through an offset of<br /> msg_iter.<br /> <br /> 3. For non-TLS sockets in tcp_bpf_sendmsg, when a "cork" situation occurs,<br /> the user-space send() doesn&amp;#39;t return an error, and the returned length is<br /> the same as the input length parameter, even if some data is cached.<br /> <br /> Additionally, I saw that the current non-zero-copy logic for handling<br /> corking is written as:<br /> &amp;#39;&amp;#39;&amp;#39;<br /> line 1177<br /> else if (ret != -EAGAIN) {<br /> if (ret == -ENOSPC)<br /> ret = 0;<br /> goto send_end;<br /> &amp;#39;&amp;#39;&amp;#39;<br /> <br /> So it&amp;#39;s ok to just return &amp;#39;copied&amp;#39; without error when a "cork" situation<br /> occurs.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2025-38167

Publication date:
03/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> fs/ntfs3: handle hdr_first_de() return value<br /> <br /> The hdr_first_de() function returns a pointer to a struct NTFS_DE. This<br /> pointer may be NULL. To handle the NULL error effectively, it is important<br /> to implement an error handler. This will help manage potential errors<br /> consistently.<br /> <br /> Additionally, error handling for the return value already exists at other<br /> points where this function is called.<br /> <br /> Found by Linux Verification Center (linuxtesting.org) with SVACE.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2025-38170

Publication date:
03/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> arm64/fpsimd: Discard stale CPU state when handling SME traps<br /> <br /> The logic for handling SME traps manipulates saved FPSIMD/SVE/SME state<br /> incorrectly, and a race with preemption can result in a task having<br /> TIF_SME set and TIF_FOREIGN_FPSTATE clear even though the live CPU state<br /> is stale (e.g. with SME traps enabled). This can result in warnings from<br /> do_sme_acc() where SME traps are not expected while TIF_SME is set:<br /> <br /> | /* With TIF_SME userspace shouldn&amp;#39;t generate any traps */<br /> | if (test_and_set_thread_flag(TIF_SME))<br /> | WARN_ON(1);<br /> <br /> This is very similar to the SVE issue we fixed in commit:<br /> <br /> 751ecf6afd6568ad ("arm64/sve: Discard stale CPU state when handling SVE traps")<br /> <br /> The race can occur when the SME trap handler is preempted before and<br /> after manipulating the saved FPSIMD/SVE/SME state, starting and ending on<br /> the same CPU, e.g.<br /> <br /> | void do_sme_acc(unsigned long esr, struct pt_regs *regs)<br /> | {<br /> | // Trap on CPU 0 with TIF_SME clear, SME traps enabled<br /> | // task-&gt;fpsimd_cpu is 0.<br /> | // per_cpu_ptr(&amp;fpsimd_last_state, 0) is task.<br /> |<br /> | ...<br /> |<br /> | // Preempted; migrated from CPU 0 to CPU 1.<br /> | // TIF_FOREIGN_FPSTATE is set.<br /> |<br /> | get_cpu_fpsimd_context();<br /> |<br /> | /* With TIF_SME userspace shouldn&amp;#39;t generate any traps */<br /> | if (test_and_set_thread_flag(TIF_SME))<br /> | WARN_ON(1);<br /> |<br /> | if (!test_thread_flag(TIF_FOREIGN_FPSTATE)) {<br /> | unsigned long vq_minus_one =<br /> | sve_vq_from_vl(task_get_sme_vl(current)) - 1;<br /> | sme_set_vq(vq_minus_one);<br /> |<br /> | fpsimd_bind_task_to_cpu();<br /> | }<br /> |<br /> | put_cpu_fpsimd_context();<br /> |<br /> | // Preempted; migrated from CPU 1 to CPU 0.<br /> | // task-&gt;fpsimd_cpu is still 0<br /> | // If per_cpu_ptr(&amp;fpsimd_last_state, 0) is still task then:<br /> | // - Stale HW state is reused (with SME traps enabled)<br /> | // - TIF_FOREIGN_FPSTATE is cleared<br /> | // - A return to userspace skips HW state restore<br /> | }<br /> <br /> Fix the case where the state is not live and TIF_FOREIGN_FPSTATE is set<br /> by calling fpsimd_flush_task_state() to detach from the saved CPU<br /> state. This ensures that a subsequent context switch will not reuse the<br /> stale CPU state, and will instead set TIF_FOREIGN_FPSTATE, forcing the<br /> new state to be reloaded from memory prior to a return to userspace.<br /> <br /> Note: this was originallly posted as [1].<br /> <br /> [ Rutland: rewrite commit message ]
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2025-38161

Publication date:
03/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction<br /> <br /> Upon RQ destruction if the firmware command fails which is the<br /> last resource to be destroyed some SW resources were already cleaned<br /> regardless of the failure.<br /> <br /> Now properly rollback the object to its original state upon such failure.<br /> <br /> In order to avoid a use-after free in case someone tries to destroy the<br /> object again, which results in the following kernel trace:<br /> refcount_t: underflow; use-after-free.<br /> WARNING: CPU: 0 PID: 37589 at lib/refcount.c:28 refcount_warn_saturate+0xf4/0x148<br /> Modules linked in: rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) rfkill mlx5_core(OE) mlxdevm(OE) ib_uverbs(OE) ib_core(OE) psample mlxfw(OE) mlx_compat(OE) macsec tls pci_hyperv_intf sunrpc vfat fat virtio_net net_failover failover fuse loop nfnetlink vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vmw_vmci vsock xfs crct10dif_ce ghash_ce sha2_ce sha256_arm64 sha1_ce virtio_console virtio_gpu virtio_blk virtio_dma_buf virtio_mmio dm_mirror dm_region_hash dm_log dm_mod xpmem(OE)<br /> CPU: 0 UID: 0 PID: 37589 Comm: python3 Kdump: loaded Tainted: G OE ------- --- 6.12.0-54.el10.aarch64 #1<br /> Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE<br /> Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015<br /> pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br /> pc : refcount_warn_saturate+0xf4/0x148<br /> lr : refcount_warn_saturate+0xf4/0x148<br /> sp : ffff80008b81b7e0<br /> x29: ffff80008b81b7e0 x28: ffff000133d51600 x27: 0000000000000001<br /> x26: 0000000000000000 x25: 00000000ffffffea x24: ffff00010ae80f00<br /> x23: ffff00010ae80f80 x22: ffff0000c66e5d08 x21: 0000000000000000<br /> x20: ffff0000c66e0000 x19: ffff00010ae80340 x18: 0000000000000006<br /> x17: 0000000000000000 x16: 0000000000000020 x15: ffff80008b81b37f<br /> x14: 0000000000000000 x13: 2e656572662d7265 x12: ffff80008283ef78<br /> x11: ffff80008257efd0 x10: ffff80008283efd0 x9 : ffff80008021ed90<br /> x8 : 0000000000000001 x7 : 00000000000bffe8 x6 : c0000000ffff7fff<br /> x5 : ffff0001fb8e3408 x4 : 0000000000000000 x3 : ffff800179993000<br /> x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000133d51600<br /> Call trace:<br /> refcount_warn_saturate+0xf4/0x148<br /> mlx5_core_put_rsc+0x88/0xa0 [mlx5_ib]<br /> mlx5_core_destroy_rq_tracked+0x64/0x98 [mlx5_ib]<br /> mlx5_ib_destroy_wq+0x34/0x80 [mlx5_ib]<br /> ib_destroy_wq_user+0x30/0xc0 [ib_core]<br /> uverbs_free_wq+0x28/0x58 [ib_uverbs]<br /> destroy_hw_idr_uobject+0x34/0x78 [ib_uverbs]<br /> uverbs_destroy_uobject+0x48/0x240 [ib_uverbs]<br /> __uverbs_cleanup_ufile+0xd4/0x1a8 [ib_uverbs]<br /> uverbs_destroy_ufile_hw+0x48/0x120 [ib_uverbs]<br /> ib_uverbs_close+0x2c/0x100 [ib_uverbs]<br /> __fput+0xd8/0x2f0<br /> __fput_sync+0x50/0x70<br /> __arm64_sys_close+0x40/0x90<br /> invoke_syscall.constprop.0+0x74/0xd0<br /> do_el0_svc+0x48/0xe8<br /> el0_svc+0x44/0x1d0<br /> el0t_64_sync_handler+0x120/0x130<br /> el0t_64_sync+0x1a4/0x1a8
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2025-38163

Publication date:
03/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> f2fs: fix to do sanity check on sbi-&gt;total_valid_block_count<br /> <br /> syzbot reported a f2fs bug as below:<br /> <br /> ------------[ cut here ]------------<br /> kernel BUG at fs/f2fs/f2fs.h:2521!<br /> RIP: 0010:dec_valid_block_count+0x3b2/0x3c0 fs/f2fs/f2fs.h:2521<br /> Call Trace:<br /> f2fs_truncate_data_blocks_range+0xc8c/0x11a0 fs/f2fs/file.c:695<br /> truncate_dnode+0x417/0x740 fs/f2fs/node.c:973<br /> truncate_nodes+0x3ec/0xf50 fs/f2fs/node.c:1014<br /> f2fs_truncate_inode_blocks+0x8e3/0x1370 fs/f2fs/node.c:1197<br /> f2fs_do_truncate_blocks+0x840/0x12b0 fs/f2fs/file.c:810<br /> f2fs_truncate_blocks+0x10d/0x300 fs/f2fs/file.c:838<br /> f2fs_truncate+0x417/0x720 fs/f2fs/file.c:888<br /> f2fs_setattr+0xc4f/0x12f0 fs/f2fs/file.c:1112<br /> notify_change+0xbca/0xe90 fs/attr.c:552<br /> do_truncate+0x222/0x310 fs/open.c:65<br /> handle_truncate fs/namei.c:3466 [inline]<br /> do_open fs/namei.c:3849 [inline]<br /> path_openat+0x2e4f/0x35d0 fs/namei.c:4004<br /> do_filp_open+0x284/0x4e0 fs/namei.c:4031<br /> do_sys_openat2+0x12b/0x1d0 fs/open.c:1429<br /> do_sys_open fs/open.c:1444 [inline]<br /> __do_sys_creat fs/open.c:1522 [inline]<br /> __se_sys_creat fs/open.c:1516 [inline]<br /> __x64_sys_creat+0x124/0x170 fs/open.c:1516<br /> do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]<br /> do_syscall_64+0xf3/0x230 arch/x86/entry/syscall_64.c:94<br /> <br /> The reason is: in fuzzed image, sbi-&gt;total_valid_block_count is<br /> inconsistent w/ mapped blocks indexed by inode, so, we should<br /> not trigger panic for such case, instead, let&amp;#39;s print log and<br /> set fsck flag.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2025-38159

Publication date:
03/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: rtw88: fix the &amp;#39;para&amp;#39; buffer size to avoid reading out of bounds<br /> <br /> Set the size to 6 instead of 2, since &amp;#39;para&amp;#39; array is passed to<br /> &amp;#39;rtw_fw_bt_wifi_control(rtwdev, para[0], &amp;para[1])&amp;#39;, which reads<br /> 5 bytes:<br /> <br /> void rtw_fw_bt_wifi_control(struct rtw_dev *rtwdev, u8 op_code, u8 *data)<br /> {<br /> ...<br /> SET_BT_WIFI_CONTROL_DATA1(h2c_pkt, *data);<br /> SET_BT_WIFI_CONTROL_DATA2(h2c_pkt, *(data + 1));<br /> ...<br /> SET_BT_WIFI_CONTROL_DATA5(h2c_pkt, *(data + 4));<br /> <br /> Detected using the static analysis tool - Svace.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2025-38160

Publication date:
03/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> clk: bcm: rpi: Add NULL check in raspberrypi_clk_register()<br /> <br /> devm_kasprintf() returns NULL when memory allocation fails. Currently,<br /> raspberrypi_clk_register() does not check for this case, which results<br /> in a NULL pointer dereference.<br /> <br /> Add NULL check after devm_kasprintf() to prevent this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2025-38165

Publication date:
03/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf, sockmap: Fix panic when calling skb_linearize<br /> <br /> The panic can be reproduced by executing the command:<br /> ./bench sockmap -c 2 -p 1 -a --rx-verdict-ingress --rx-strp 100000<br /> <br /> Then a kernel panic was captured:<br /> &amp;#39;&amp;#39;&amp;#39;<br /> [ 657.460555] kernel BUG at net/core/skbuff.c:2178!<br /> [ 657.462680] Tainted: [W]=WARN<br /> [ 657.463287] Workqueue: events sk_psock_backlog<br /> ...<br /> [ 657.469610] <br /> [ 657.469738] ? die+0x36/0x90<br /> [ 657.469916] ? do_trap+0x1d0/0x270<br /> [ 657.470118] ? pskb_expand_head+0x612/0xf40<br /> [ 657.470376] ? pskb_expand_head+0x612/0xf40<br /> [ 657.470620] ? do_error_trap+0xa3/0x170<br /> [ 657.470846] ? pskb_expand_head+0x612/0xf40<br /> [ 657.471092] ? handle_invalid_op+0x2c/0x40<br /> [ 657.471335] ? pskb_expand_head+0x612/0xf40<br /> [ 657.471579] ? exc_invalid_op+0x2d/0x40<br /> [ 657.471805] ? asm_exc_invalid_op+0x1a/0x20<br /> [ 657.472052] ? pskb_expand_head+0xd1/0xf40<br /> [ 657.472292] ? pskb_expand_head+0x612/0xf40<br /> [ 657.472540] ? lock_acquire+0x18f/0x4e0<br /> [ 657.472766] ? find_held_lock+0x2d/0x110<br /> [ 657.472999] ? __pfx_pskb_expand_head+0x10/0x10<br /> [ 657.473263] ? __kmalloc_cache_noprof+0x5b/0x470<br /> [ 657.473537] ? __pfx___lock_release.isra.0+0x10/0x10<br /> [ 657.473826] __pskb_pull_tail+0xfd/0x1d20<br /> [ 657.474062] ? __kasan_slab_alloc+0x4e/0x90<br /> [ 657.474707] sk_psock_skb_ingress_enqueue+0x3bf/0x510<br /> [ 657.475392] ? __kasan_kmalloc+0xaa/0xb0<br /> [ 657.476010] sk_psock_backlog+0x5cf/0xd70<br /> [ 657.476637] process_one_work+0x858/0x1a20<br /> &amp;#39;&amp;#39;&amp;#39;<br /> <br /> The panic originates from the assertion BUG_ON(skb_shared(skb)) in<br /> skb_linearize(). A previous commit(see Fixes tag) introduced skb_get()<br /> to avoid race conditions between skb operations in the backlog and skb<br /> release in the recvmsg path. However, this caused the panic to always<br /> occur when skb_linearize is executed.<br /> <br /> The "--rx-strp 100000" parameter forces the RX path to use the strparser<br /> module which aggregates data until it reaches 100KB before calling sockmap<br /> logic. The 100KB payload exceeds MAX_MSG_FRAGS, triggering skb_linearize.<br /> <br /> To fix this issue, just move skb_get into sk_psock_skb_ingress_enqueue.<br /> <br /> &amp;#39;&amp;#39;&amp;#39;<br /> sk_psock_backlog:<br /> sk_psock_handle_skb<br /> skb_get(skb)
Severity CVSS v4.0: Pending analysis
Last modification:
18/12/2025

CVE-2025-38162

Publication date:
03/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: nft_set_pipapo: prevent overflow in lookup table allocation<br /> <br /> When calculating the lookup table size, ensure the following<br /> multiplication does not overflow:<br /> <br /> - desc-&gt;field_len[] maximum value is U8_MAX multiplied by<br /> NFT_PIPAPO_GROUPS_PER_BYTE(f) that can be 2, worst case.<br /> - NFT_PIPAPO_BUCKETS(f-&gt;bb) is 2^8, worst case.<br /> - sizeof(unsigned long), from sizeof(*f-&gt;lt), lt in<br /> struct nft_pipapo_field.<br /> <br /> Then, use check_mul_overflow() to multiply by bucket size and then use<br /> check_add_overflow() to the alignment for avx2 (if needed). Finally, add<br /> lt_size_check_overflow() helper and use it to consolidate this.<br /> <br /> While at it, replace leftover allocation using the GFP_KERNEL to<br /> GFP_KERNEL_ACCOUNT for consistency, in pipapo_resize().
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2026

CVE-2025-38164

Publication date:
03/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> f2fs: zone: fix to avoid inconsistence in between SIT and SSA<br /> <br /> w/ below testcase, it will cause inconsistence in between SIT and SSA.<br /> <br /> create_null_blk 512 2 1024 1024<br /> mkfs.f2fs -m /dev/nullb0<br /> mount /dev/nullb0 /mnt/f2fs/<br /> touch /mnt/f2fs/file<br /> f2fs_io pinfile set /mnt/f2fs/file<br /> fallocate -l 4GiB /mnt/f2fs/file<br /> <br /> F2FS-fs (nullb0): Inconsistent segment (0) type [1, 0] in SSA and SIT<br /> CPU: 5 UID: 0 PID: 2398 Comm: fallocate Tainted: G O 6.13.0-rc1 #84<br /> Tainted: [O]=OOT_MODULE<br /> Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006<br /> Call Trace:<br /> <br /> dump_stack_lvl+0xb3/0xd0<br /> dump_stack+0x14/0x20<br /> f2fs_handle_critical_error+0x18c/0x220 [f2fs]<br /> f2fs_stop_checkpoint+0x38/0x50 [f2fs]<br /> do_garbage_collect+0x674/0x6e0 [f2fs]<br /> f2fs_gc_range+0x12b/0x230 [f2fs]<br /> f2fs_allocate_pinning_section+0x5c/0x150 [f2fs]<br /> f2fs_expand_inode_data+0x1cc/0x3c0 [f2fs]<br /> f2fs_fallocate+0x3c3/0x410 [f2fs]<br /> vfs_fallocate+0x15f/0x4b0<br /> __x64_sys_fallocate+0x4a/0x80<br /> x64_sys_call+0x15e8/0x1b80<br /> do_syscall_64+0x68/0x130<br /> entry_SYSCALL_64_after_hwframe+0x67/0x6f<br /> RIP: 0033:0x7f9dba5197ca<br /> F2FS-fs (nullb0): Stopped filesystem due to reason: 4<br /> <br /> The reason is f2fs_gc_range() may try to migrate block in curseg, however,<br /> its SSA block is not uptodate due to the last summary block data is still<br /> in cache of curseg.<br /> <br /> In this patch, we add a condition in f2fs_gc_range() to check whether<br /> section is opened or not, and skip block migration for opened section.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2026

CVE-2025-38155

Publication date:
03/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: mt76: mt7915: Fix null-ptr-deref in mt7915_mmio_wed_init()<br /> <br /> devm_ioremap() returns NULL on error. Currently, mt7915_mmio_wed_init()<br /> does not check for this case, which results in a NULL pointer<br /> dereference.<br /> <br /> Prevent null pointer dereference in mt7915_mmio_wed_init().
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2025